** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
** Changed in: linux-lts-xenial (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-xenial (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-xenial (Ubuntu Wily)
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/911397
Title:
CVE-2011-4127
To manage notifications about this bug
** Changed in: linux-raspi2 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu Wily)
Importance: Undecided
** Changed in: linux-lts-wily (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-lts-wily (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-wily (Ubuntu Wily)
Importance:
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-fsl-imx51 (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Xenial)
Importance: Medium
Status: Invalid
** Also affects:
** Changed in: linux (Ubuntu Precise)
Status: Fix Released => Invalid
** Changed in: linux (Ubuntu Trusty)
Status: Fix Released => Invalid
** Changed in: linux (Ubuntu Vivid)
Status: Fix Released => Invalid
** Changed in: linux (Ubuntu Wily)
Status: Fix Released =>
** No longer affects: linux-lts-trusty (Ubuntu Utopic)
** No longer affects: linux-armadaxp (Ubuntu Utopic)
** No longer affects: linux-ec2 (Ubuntu Utopic)
** No longer affects: linux-goldfish (Ubuntu Utopic)
** No longer affects: linux-lts-saucy (Ubuntu Utopic)
** No longer affects:
** Also affects: linux (Ubuntu Wily)
Importance: Medium
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Medium
Status: Invalid
** Also affects:
** No longer affects: linux-lts-trusty (Ubuntu Lucid)
** No longer affects: linux-armadaxp (Ubuntu Lucid)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-goldfish (Ubuntu Lucid)
** No longer affects: linux-lts-saucy (Ubuntu Lucid)
** No longer affects:
** Changed in: linux-goldfish (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-goldfish (Ubuntu Precise)
Importance: Undecided = Medium
** Changed in: linux-goldfish (Ubuntu Trusty)
Status: New = Invalid
** Changed in: linux-goldfish (Ubuntu Trusty)
Importance:
** Changed in: linux-lts-trusty (Ubuntu Vivid)
Status: New = Invalid
** Changed in: linux-lts-trusty (Ubuntu Vivid)
Importance: Undecided = Medium
** Changed in: linux-lts-trusty (Ubuntu Utopic)
Status: New = Invalid
** Changed in: linux-lts-trusty (Ubuntu Utopic)
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-trusty (Ubuntu Precise)
Importance: Undecided = Medium
** Changed in: linux-lts-trusty (Ubuntu Trusty)
Status: New = Invalid
** Changed in: linux-lts-trusty (Ubuntu Trusty)
** Also affects: linux (Ubuntu Vivid)
Importance: Medium
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Medium
Status: Invalid
** Also affects:
** No longer affects: linux-armadaxp (Ubuntu Saucy)
** No longer affects: linux-ec2 (Ubuntu Saucy)
** No longer affects: linux-lts-saucy (Ubuntu Saucy)
** No longer affects: linux-lts-quantal (Ubuntu Saucy)
** No longer affects: linux-mvl-dove (Ubuntu Saucy)
** No longer affects: linux
** No longer affects: linux-armadaxp (Ubuntu Quantal)
** No longer affects: linux-ec2 (Ubuntu Quantal)
** No longer affects: linux-lts-saucy (Ubuntu Quantal)
** No longer affects: linux-lts-quantal (Ubuntu Quantal)
** No longer affects: linux-mvl-dove (Ubuntu Quantal)
** No longer affects:
** Also affects: linux (Ubuntu Utopic)
Importance: Medium
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Utopic)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Utopic)
Importance: Medium
Status: Invalid
** Also affects:
If i'm change Affect me always have message Timeout error, please try
again in a few minutes.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/911397
Title:
CVE-2011-4127
To manage notifications
** Also affects: linux (Ubuntu Trusty)
Importance: Medium
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Trusty)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Trusty)
Importance: Medium
Status: Invalid
** Also affects:
** Changed in: linux-lts-backport-natty (Ubuntu Lucid)
Status: New = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/911397
Title:
CVE-2011-4127
To manage notifications about this
** No longer affects: linux-armadaxp (Ubuntu Hardy)
** No longer affects: linux-armadaxp (Ubuntu Oneiric)
** No longer affects: linux-ec2 (Ubuntu Hardy)
** No longer affects: linux-ec2 (Ubuntu Oneiric)
** No longer affects: linux-lts-backport-oneiric (Ubuntu Hardy)
** No longer affects:
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New = Invalid
** Changed in: linux-lts-raring (Ubuntu Precise)
Importance: Undecided = Medium
** Changed in: linux-lts-raring (Ubuntu Oneiric)
Status: New = Invalid
** Changed in: linux-lts-raring (Ubuntu Oneiric)
** Also affects: linux (Ubuntu Saucy)
Importance: Medium
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Saucy)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Saucy)
Importance: Medium
Status: Invalid
** Also affects:
** Changed in: linux-armadaxp (Ubuntu Raring)
Status: Fix Released = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/911397
Title:
CVE-2011-4127
To manage notifications about this bug
** Also affects: linux (Ubuntu Raring)
Importance: Medium
Status: Fix Released
** Also affects: linux-fsl-imx51 (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Also affects: linux-mvl-dove (Ubuntu Raring)
Importance: Medium
Status: Invalid
** Also affects:
** Changed in: linux (Ubuntu Natty)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/911397
Title:
CVE-2011-4127
To manage notifications about this bug go to:
These 3 patches are in linux-armadaxp through Linux 3.2.2 and
Ubuntu-3.2.0-12.20
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
all 3 break-fix patches in upstream 3.5 already
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/911397
Title:
all 3 break-fix patches in upstream 3.5 already
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/911397
Title:
CVE-2011-4127
To manage notifications about this bug go to:
** Changed in: linux (Ubuntu Quantal)
Status: Fix Committed = Fix Released
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Description changed:
- Paolo Bonzini of Red Hat found out that the host Linux system allows
- executing the SG_IO ioctl on a partition or even on an LVM volume, and
- will pass the command to the underlying block device. This could be
- further exploited in the in the context of
** Also affects: linux (Ubuntu Quantal)
Importance: Medium
Status: Fix Committed
** Also affects: linux-armadaxp (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also affects: linux-ec2 (Ubuntu Quantal)
Importance: Medium
Status: Invalid
** Also affects:
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New = Fix Committed
** Changed in: linux-armadaxp (Ubuntu Quantal)
Importance: Undecided = Medium
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/911397
Title:
CVE-2011-4127
To manage notifications about this bug
** Changed in: linux-armadaxp (Ubuntu Precise)
Importance: Undecided = Medium
** Changed in: linux-armadaxp (Ubuntu Oneiric)
Status: New = Invalid
** Changed in: linux-armadaxp (Ubuntu Oneiric)
Importance: Undecided = Medium
** Changed in: linux-armadaxp (Ubuntu Lucid)
** Changed in: linux-armadaxp (Ubuntu Maverick)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/911397
Title:
CVE-2011-4127
To manage notifications about this bug go to:
** Changed in: linux (Ubuntu Maverick)
Status: New = Invalid
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux (Ubuntu Oneiric)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/911397
Title:
CVE-2011-4127
To manage notifications about this bug
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: Fix Committed = Fix Released
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
Status: Fix Committed = Fix Released
** Changed in: linux (Ubuntu Lucid)
Status: Fix Committed = Fix Released
--
You received this bug
** Changed in: linux (Ubuntu Hardy)
Assignee: (unassigned) = Andy Whitcroft (apw)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/911397
Title:
CVE-2011-4127
To manage notifications about this
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Lucid)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/911397
** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid)
Status: New = Fix Committed
** Changed in: linux (Ubuntu Oneiric)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux (Ubuntu Precise)
Status: New = Fix Committed
** Description changed:
Paolo Bonzini of Red Hat found out that the host Linux system allows
executing the SG_IO ioctl on a partition or even on an LVM volume, and
will pass the command to the underlying block device.
** Changed in: linux-mvl-dove (Ubuntu Lucid)
Status: New = Invalid
** Changed in: linux-mvl-dove (Ubuntu Maverick)
Status: New = Invalid
** Changed in: linux-ti-omap4 (Ubuntu Oneiric)
Status: New = Invalid
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New =
Fixes have been accepted upstream:
git log 81d48f0..ec8013b
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/911397
Title:
CVE-2011-4127
To manage notifications about this bug go to:
http://rwmj.wordpress.com/2011/12/22/cve-2011-4127-privilege-escalation-from-qemu-kvm-guests/
https://lkml.org/lkml/2011/12/22/270
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/911397
Title:
CVE-2011-4127
** Also affects: linux (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: linux-ec2 (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Precise)
Importance: Undecided
Status: New
** Also
47 matches
Mail list logo